load1.pdb
Static task
static1
General
-
Target
new_gold_loader.exe
-
Size
132KB
-
MD5
dc8dd433f7188b38572ca58e97db9c87
-
SHA1
4e6d41dfab5d52915d63f329a79001bc37fb0e1d
-
SHA256
1659b4c240b76889176d0724cda7ccdacb18c762e47e6f6e42a96ccea85d5238
-
SHA512
f93e84c6413c5085d9afaf8c47c1a9f57742c341777e68267ad7afd5a1e0d5dd52a360c38eb9cc1606c73a172fdbc069059667adcbc49f130d92b30b6cf70756
-
SSDEEP
3072:DA3A4M2v6PQR55GKRMS/rQRff5jpqc89TIf4onI+w0:YAJ2rGKRLrQRff5jpqc89TIf4onI+w
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource new_gold_loader.exe
Files
-
new_gold_loader.exe.exe windows:4 windows x64 arch:x64
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Sections
qWU<6 Size: 33KB - Virtual size: 33KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text Size: 96KB - Virtual size: 95KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ